This website uses cookies to improve user experience. By using this website you consent to all cookies in accordance with our terms.



The Honerix infrastructure leverages plugin modules to mimic the behavior of different web applications, trying to push attackers into deploying their malicious payload. This page lists and describes available plugins; by clicking on the plugin name you are redirected to the results for that module.

Tag search

Popular tags

Apache Axis2 Fingerprint

Apache axis2 fingerprint attempts.

Plugin ID: 62675fd9604c7736860a2bab16a6769c

Apache Struts2 S2-032

Remote Code Execution can be performed via "method:" prefix when Dynamic Method Invocation is enabled


Plugin ID: 35eaed8dafb6344a5574db94a4e0ce45

Apache Struts2 Jakarta Multipart parser RCE

Apache Struts2 (2.3.5-2.3.31 and 2.5-2.5.10) RCE on file upload with Jakarta Multipart parser

CVE: CVE-2017-5638


Plugin ID: ffb3ec6a0a9e06a692cee5cb41a1ae77

Struts2 Prefixed Parameters OGNL Injection Vulnerability

Struts2 (v2.0.0 - 2.3.15) is vulnerable to remote OGNL injection which leads to arbitrary Java method execution on the target server.

CVE: CVE-2013-2251


Plugin ID: fe0kao2aihoongoo6eithungeozei8wo